Cloud security
White papers
![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Total cost of ownership for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/tco-headersecurity-informed-sizes-920-x-533-px.png)
Total cost of ownership for video surveillance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Understanding all-in-one solutions](https://www.sourcesecurity.com/img/white-papers/612/920x533_1709648610.png)
Understanding all-in-one solutions
Download![Top 7 trends to watch in the physical security industry](https://www.sourcesecurity.com/img/white-papers/612/920x533_1707306824.jpg)
Top 7 trends to watch in the physical security industry
Download![2024 trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1704889476.png)
2024 trends in video surveillance
Download![Securing data centres: Varied technologies and exacting demands](https://www.sourcesecurity.com/img/white-papers/612/920x533_1703082955.png)
Securing data centres: Varied technologies and exacting demands
Download![How to create a successful physical security roadmap](https://www.sourcesecurity.com/img/white-papers/612/920x533_1702485769.png)
How to create a successful physical security roadmap
Download![The real cost of an outdated Video Security System](https://www.sourcesecurity.com/img/white-papers/612/920x533_1700497069.png)
The real cost of an outdated Video Security System
Download![Securing your growth with video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696953044.png)
Securing your growth with video surveillance
Download![The top 4 reasons to upgrade physical security with the Cloud](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696264536.jpg)
The top 4 reasons to upgrade physical security with the Cloud
Download![Access control: The enterprise buyer's guide](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696261120.png)
Access control: The enterprise buyer's guide
Download![Integrating control access and security](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696258072.png)
Integrating control access and security
Download![Securing care closer to patients](https://www.sourcesecurity.com/img/white-papers/612/920x533_1695745509.png)
Securing care closer to patients
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
News
Datadobi, a global pioneer in Hybrid Cloud Data Services announced the appointment of Denise Natali to the position of Vice President of Americas Sales. In this newly created position, Natali will report directly to CRO and Co-Founder Michael Jack and be responsible for developing and executing revenue growth strategies, growing and leading Datadobi’s high-performance sales team, and ensuring Datadobi customers remain the most highly satisfied across the industry. Denise Natali Natali comes to Datadobi with an enviable track record and expertise in organisational transformation and expansion, as well as cybersecurity, digital modernisation, and cloud solutions. Before Datadobi, Natali served as Vice President at Cox Communications, Regional Director of Enterprise Sales at Lumen Technologies, and Vice President of Sales at FastPay. She is a military veteran, having served her country in the US Army as a Military Intelligence Officer. She is also an award-winning cartoonist and a published author. Innovation and advanced proven solutions “I am honoured to join Datadobi, a company that stands out not only for its groundbreaking innovation and advanced, proven solutions but also for its unwavering integrity. This is a refreshing and increasingly rare quality in today's market,” said Natali. “I look forward to contributing to Datadobi's ongoing success and being part of a team that consistently sets the standard for excellence." StorageMAP unstructured data management platform “Denise arrives at Datadobi at a crucial juncture – as we experience strong growth and unprecedented success with our StorageMAP unstructured data management platform,” said Jack. “Her unparalleled relationship-building acumen, exceptional sales expertise, and strategic analysis skillset will bolster our ability to continue to deliver extraordinary value to our customers while driving substantial market expansion.”
There is much discussion amongst telecommunications companies about the automation journey of networks, and rightly so because artificial intelligence (AI), machine learning (ML), and pressure on carriers to increase margins from connectivity whilst protecting prices, are proving powerful agents for change in their market. Impact of hybrid connectivity However, there’s one other development that is not receiving enough attention, and that’s the impact of hybrid connectivity - the bonding of networks. Here, Tristan Wood, UK MD of Livewire Digital, explains why this could prove in the maritime sector (in fact, in most others too) to be the biggest disrupter of all. Multiple networks and route traffic The cost of airtime has always been an important consideration for the user A PwC industry survey in 2023 cited that nearly half of the telecom CEOs polled worldwide predicted existential threats unless their companies adapted to the changing market. Add that other B2B operators are rapidly moving into the connectivity space and it’s easy to see why the battle for revenue could get nasty. At present, the dominant broadband communications in maritime remains satellite, and yet the cost of airtime has always been an important consideration for the user. This is where true hybrid comes in, the ability to bond multiple networks and route traffic via the most effective network. NexusWave Enter Inmarsat’s newly launched NexusWave, a “unified multi-dimensional network, delivering high-speed service, unlimited data, and global coverage at sea – all through a single provider.” This combines the traditional GEO satellite connectivity with more cost-effective and efficient services, such as Low Earth Orbit satellite (LEO) with terrestrial LTE cellular services when within range of coastal cell sites. Generative AI tools But let the company return for a moment to where it started, which is autonomy on the networks because this seems to be where so many telecom companies are putting much of their efforts. These are a new generation of networks that use generative AI tools to self-monitor their operations and resolve technical issues, on-demand and beyond pre-defined design bounds. Undoubtedly this could revolutionise the telephony and the connectivity markets on a level never seen before. Automating tasks A key factor is how quickly the established players – and the less established ‘disrupters’ – will be in implementing Whatever the pace of take-up, the pathway from networks that automate tasks within pre-defined limits – Level 3 autonomy – to networks that can adapt to the unknown – Level 5 – is inevitable. A key factor is how quickly the established players – and the less established ‘disrupters’ – will be in implementing it, and to what extent. Manual maintenance and monitoring According to TM Forum, the global industry association for service providers and their suppliers, most telcos (84%) are not even at Level 3 autonomy for their networks, which means they are somewhere between manual maintenance and monitoring at one end, and closed-loop operations with partial and selective artificial intelligence (AI) in very specific environments at the other. According to the Capgemini Research Institute, most telcos aspire to reach at least Level 3 autonomy by 2028. Why does all this matter? With autonomy, come benefits, not just in terms of quality of service (QoS) and experience (QoE), but also commercially. Through various autonomous network initiatives implemented over the past two years, many telcos worldwide have harvested improvements in operational performance, by as much as 20%, and operational expenditure (Op Ex) by 18%. The economics alone stack up. Adaptive and dynamic network For telcos embracing satellite and cellular, or any other networks in their proposition, the benefits will be even greater The company simply doesn’t have time to go into the technical detail of implementing autonomy, be it fixed line, cellular, or satellite network, but the broad principles will be pretty adjacent. These may include customer-facing conditions such as subscriber churn and behaviour predictive analysis, predictive maintenance, network slice optimisation (i.e., customising their networks for different applications and customers), adaptive and dynamic network policies, and network failure prediction, among many others. Taken together, however, the benefits can and indeed should be enormous. However, for those telcos embracing satellite and cellular, or indeed any other networks in their proposition, the benefits will be even greater. Which leads us nicely back to hybrid. Welcome to a three-dimensional world So far, the company has been talking about introducing autonomy in a vertical sense, across a linear network, whether on land it may be a fibre or 5G, for instance. As the company has already seen, introducing AI and automation into national networks like these at scale, is a colossal enough task on its own, notwithstanding the additional challenge that many if not most countries class networks as critical national infrastructure (CNI), meaning that stability and compliance are not just good to have, they are legal obligations. However, if the company are talking about true hybrid connections, not just failover and redundancy, which are not the same things and have few of the benefits of hybrid - then the company are moving conceptually from the vertical integration of autonomy to the three-dimensional. Seamless connection At its core, true hybrid networks become ‘heterogenous’ – turning a single bonded connection - fixed line, cellular, satellite, emergency services network, whatever the underlay or infrastructure – into one seamless connection. The benefits of which, for the user, are off the grid. In short, with true hybrid, the company are talking about ubiquitous, always-on, guaranteed connectivity, and intelligent management of physical, virtual and financial resources to suit an almost limitless range of conditions. In government and business-critical environments, this is even more important because lives and livelihoods could be at stake as well. And as Inmarsat’s NexusWave shows, the maritime sector will be amongst the first to cash in on the benefits. It's Hybrid but not as users know it This architecture creates a virtual overlay that bonds underlying private or public WAN connections Central to hybrid is SD-WAN - a technology that uses software-defined networking concepts to distribute network traffic across a wide area network, or WAN. This architecture creates a virtual overlay that bonds underlying private or public WAN connections, such as fibre, wireless, satellite, or cellular. As a result, hybrid SD-WAN networking can agnostically combine and transition between these networks. In this way, multiple network technologies are able to work seamlessly together, actively sharing the load and resources, by combining, and binding together a potentially unlimited variety of bearers into a single ‘pipe’. Optimise performance and reduce costs Delivering a faster and, crucially, more reliable service, a hybrid platform adapts to a range of potential variables, depending upon each bearer’s performance and any other environmental conditions affecting it, to optimise performance and reduce costs. Similar to how voice calls are routed for minimum cost, settings in a hybrid environment can be adjusted to use the most cost-effective option, like prioritising cellular over satellite if it works well enough. This saves money by making the best use of the most cost-effective capacity. Future connectivity services The same approach should be taken for QoS to ensure important applications perform well despite limited network capacity and changing bandwidth and latency. Being able to integrate existing with future connectivity services is a powerful proposition that can enable more efficient systems, workflows, and people, and there are many underlying communication technologies willing to pick up this baton. Addressing coverage, bandwidth, reliability, and cost No single network service can address the exponential demand for seamless connectivity Despite recent advances in telecommunications technology - from 5G and disruptive low-cost LEO satellite services – no single network service can address the exponential demand for seamless connectivity on the move. Nor is there any provider that can offer a single comprehensive solution that can address coverage, bandwidth, reliability, and most importantly cost. Monetisation of hybrid is coming The concept of agnostically making use of any carrier network, based on location, cost, or quality of service, should dramatically reduce the impact of the problem, and yet awareness and the application of ‘bonding’ hybrid technology are nowhere near where they should be as machines and people demand ever faster ‘always-on’ connectivity. The market opportunities are seemingly unlimited for the adoption of true hybrid. Designed to meet the challenges presented by a fast-moving train traveling through different areas of network coverage, smart networking enables a dynamic connection through various operators using a range of underlying communication technologies such as 3G, 4G, 5G, Wi-Fi, and satellite. Intelligent connection Many other industries spanning defence, space exploration, connected and autonomous vehicles, emergency services, telehealth, cloud-based HPC, as well as AI and machine learning, require more than just connectivity; they demand an "intelligent connection." This unstoppable process is ushering in significant opportunities for telecommunications companies (and OEMs, and many other technology-driven enterprises besides) to revolutionise their operations, and the same applies to consumer services. Automation and AI Wider applications of automation and AI in many other realms of life are forcing players to scale up and/or hasten From connected, intelligent and software-defined vehicle manufacture to aircraft as a service, smart aircraft and mobility, the speed of change and the wider application of automation and AI in many other realms of life are forcing players to scale up and/or hasten increasing horizontal consolidation of the sector. In short, hybrid is here to stay, and users can read a free report on this very subject of how telcos could be impacted. At the crest of the wave As mentioned earlier, maritime operators have long been exposed to an ever-greater need for both data and speed of connection onboard their vessels, running in parallel with the problem of ensuring ubiquitous connectivity regardless of location. Couple this with the challenge of security and efficiency of communications and it’s easy to see why the history of maritime connectivity has been beset with multiple, fragmented systems and data caps, limited speeds, and patchy coverage, not to mention the growing need to counter cyber-attack. Inmarsat’s NexusWave meets all these challenges, and sitting at the heart of this is RazorLink, a British invention already in use on land in defence, first responder, and commercial sectors, which uses SD-WAN to bond, control and harmonise maritime network connectivity, efficiency, and cost. So, what’s the issue here for telecommunication companies? Big money will eventually follow the adoption of true hybrid. If true hybrid enables customers to be network agnostic, which it does, then everything is up for grabs But if enterprises large and small are following B2B service providers who bundle connectivity with their services such as desktop management and enterprise mobility; cloud-based solutions and software as a service (SaaS), the market risks even greater fragmentation. If true hybrid enables customers to be network agnostic, which it does, then everything is up for grabs. Embedding true hybrid and cash Surely, it makes sense for telcos to make the first move and to do so early before others move into this space. While they are at such a crucial pivot point for the survival of their business models, it makes sense for telecommunication companies to embed true hybrid and cash in on the huge market opportunities it brings with it.
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimeters, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology offers benefits such as scalability, cost-efficiency, and centralised management. The partnership between Bosch Building Technologies and Eagle Eye Networks aims to provide an intelligent solution that supports businesses to work more efficiently and make the world a safer place. Integrating cloud video surveillance RESTful API forum for creators to create apps leveraging and integrating cloud video surveillance Eagle Eye’s true cloud solutions are known to be smart, simple, and secure. Purpose-built for the cloud and AI, the Eagle Eye Cloud VMS addresses customers’ security needs with infinite scalability, flexible pricing plans, a wide array of advanced analytics, and an open RESTful API platform for developers to easily create applications leveraging and integrating cloud video surveillance. Bosch Building Technologies offers a wide range of AI-enabled fixed, moving, specialty, and robust cameras that deliver the right levels of data and evidence, are secure and cyber-resistant, and are easy to deploy. Bosch’s application-specific video analytics at the edge performs real-time video processing to automatically generate metadata descriptions of events. Integration of Bosch cameras The integration of Bosch cameras with built-in video analytics and the Eagle Eye Cloud VMS provides users with advanced notifications of potential security risks, enhancing situational awareness and ensuring control from anywhere. Visual data generated by Bosch cameras is highly accurate and reliable, supporting smart decisions and proactive responses to minimise risk and potential damages. Video cameras can act as sensors thanks to edge-based, application-specific analytics, helping secure perimeters, increase safety in or around buildings, and collect data for decision-making. Deployment in bandwidth-limited areas Eagle Eye Cloud VMS lets clear video access via the cloud, with picks for event-based or serial recording The Eagle Eye Cloud VMS allows detailed video access through the cloud, with options for event-based or continuous recording, and storage retention ranging from 7 days to 5 years. This integrated solution is scalable, facilitating rapid deployment in bandwidth-limited areas, and features an AI-powered Smart Video Search, enabling users to search for a person, vehicle, or object across multiple cameras and sites, returning accurate results immediately. “We are an open camera player with multiple software partners, and we are delighted to add Eagle Eye Networks as a partner to further extend our cloud-related offerings to our customers, benefiting them with our differentiating camera technologies,” said Michael Seiter, Senior Vice President of Bosch Video Systems and Solutions. Outstanding partnerships Seiter added: “Just like our outstanding partnerships with other pioneering solution providers, we look forward to creating key differentiators in this powerful edge and cloud partnership.” “We are extremely pleased that Bosch Building Technologies has invited Eagle Eye Networks to become a technology partner and look forward to delivering exceptional cloud and edge solutions that solve business problems and deliver value to our global customers,” said Dean Drako, Founder and CEO of Eagle Eye Networks.
Arcserve, a major data protection and recovery software company, has been recognised for its excellence in SaaS backup, being named Cloud Backup Company of the Year at the Storage Awards 2024. The award recognised Arcserve as a provider of secure and resilient cloud storage and SaaS protection, highlighting the organisation as a trusted provider of data resilience solutions. Cloud data protection The awards showcase the best technologies, products, and solutions across the storage sector Arcserve’s dedication to cloud data protection, including solutions to protect data hosted in SaaS application clouds, such as Microsoft Office 365, Entra ID, Salesforce, and Google Workspace won them a top spot at the industry-recognised awards. The awards showcase the best technologies, products, and solutions across the storage sector, and this recognition highlights Arcserve’s 40+ year commitment to providing business continuity solutions that safeguard multi-generational IT infrastructures. Seamless data protection solutions Joanna Godridge, Sales Director, UK, Arcserve, commented, "We are thrilled to receive this award which recognises our commitment to excellence, our drive to protect the organisation’s data, and our unbeatable expertise, which bring together decades of experience and we hope to continue protecting global businesses from imminent data loss." Joanna Godridge adds, "Every sector is under threat. Whether it be ransomware attacks, data loss, or other disasters, no organisation is safe without protection, and data loss is happening continuously. We support businesses from startups to enterprises, providing seamless and comprehensive data protection solutions for challenges of all shapes and sizes. Secure data should be every business’ goal, and we help them to achieve this."
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Cybersecurity challenges Pioneers were looking for a new way to understand better and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. csHAZOP services To help overcome these challenges, the company called in Honeywell and, specifically, its Honeywell Cybersecurity HAZOP (csHAZOP) services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations – it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences. Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals). Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable. Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Determining cybersecurity hazards The Honeywell cybersecurity professionals also identified some high-risk design deficiencies For this project, the Honeywell OT cybersecurity professionals used the Honeywell proprietary csHAZOP method to identify several concrete recommendations for immediate remediation and technical design in the company’s ICS to be considered in upcoming migrations. The Honeywell cybersecurity professionals also identified some high-risk design deficiencies. The Honeywell csHAZOP framework was also used to identify levels of residual risk to determine which cybersecurity hazards were more critical to address versus others. Cybersecurity assessments Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections, and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems, and the team’s experience and efforts in OT cybersecurity. Customer's quote “The results of the cshazop assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation," said a major refinery in Europe. "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats.”
Burger King is a global chain of fast-food restaurants, founded in 1954 in Miami, Florida. It has since expanded into one of the world’s largest fast-food chains, with thousands of locations spanning over 100 countries. The company is known for its commitment to quality ingredients, innovative menu items, and iconic marketing campaigns. With a steadfast focus on continual improvement and innovation, Burger King remains at the forefront of ensuring a secure dining experience for its customers across its global network of restaurants. The company prioritises robust security measures within its restaurants. Challenge Integrate security system and video surveillance across all Burger King branches in Norway. Burger King, like many fast-food businesses, uses security systems and video surveillance to keep their property safe from theft, vandalism, and unauthorised access. This creates an atmosphere where staff and customers feel safe and comfortable. The main aim was to safeguard the buildings, equipment, employees, and customers while causing as little disturbance to the operation of the chain’s restaurants as possible. Solution Wireless security system with easy-to-use mobile management and flexible access control, ensuring seamless integration into daily operations. Hub 2 Plus Jeweller control panel Hub 2 Plus Jeweller control panel supports a great number of security devices and user groups AlarmLink Oslo AS is a security installation company that operates throughout the entire country. The installer has recommended Ajax devices as a professional solution that meets the most stringent security standards. Each restaurant was equipped with a Hub 2 Plus Jeweller control panel. This model supports a great number of security devices and user groups. Ajax Cloud It is crucial for further scaling, as it allows for accommodating expanding security needs without major infrastructure changes. With four communication channels and LTE support, the hub can be connected to two separate Internet providers over Ethernet and Wi-Fi while having two cellular services ready for backup. It guarantees connectivity to Ajax Cloud and the central monitoring station under any conditions. Motion and opening detectors control all possible entries into the building, protecting against intrusion and burglary KeyPad Jeweller Ajax solutions are designed for ease of use. Through the app, restaurant executives with admin rights can manage the security system directly from their smartphones. They receive immediate notifications when someone enters restricted areas, as KeyPad Jeweller is installed at the service premises entrance. Ajax app Restaurant staff smoothly integrated Ajax devices into their routine, using the Ajax app as the primary interface for the system. Managers arm the system when they leave and disarm it upon arrival. They can efficiently control access to restricted areas and receive real-time notifications for any security breaches. This integration not only ensures smooth restaurant operations but also enhances premises security and monitoring at all times. Seamless integration With Ajax technologies, the restaurant chain effortlessly eliminated the need for costly new installations All suggested features were seamlessly integrated with Burger King’s existing video surveillance system because third-party cameras can be easily added to the Ajax app. With Ajax technologies, the restaurant chain effortlessly eliminated the need for costly new installations. This straightforward integration not only enhanced security measures but also saved the company money. Sleek and modern look Additionally, Ajax devices are visually appealing and seamlessly fit into the interior. Ajax Systems offers security solutions that not only keep things safe but also blend in nicely with any environment. Therefore, the sleek and modern look of Ajax products contributes to a welcoming and safe dining experience for customers. Why Ajax Cost savings on installation: In certain countries, such as Norway, installing security devices can be expensive due to taxes and other related costs. Ajax reduced this expense item by half. The devices are ready to use out of the box, easy to install, and can be added to the system by scanning a QR code. Seamless integration with existing security system: Ajax’s partners, specialists from AlarmLink Oslo AS, took a balanced approach and effectively integrated the existing video surveillance system with the Ajax security system. Easy system management: Ajax solutions are excellent for chain companies, as they streamline the application of security features across all locations. Staff can quickly learn to use the system, which is especially important for businesses with high employee turnover rates. Products Hub 2 Plus Jeweller: Security system control panel DoorProtect Jeweller: Wireless opening detector MotionProtect Jeweller: Wireless motion detector KeyPad Jeweller: Wireless wall-mounted keypad MotionCam Jeweller: Motion detector with a photo camera to verify alarms
As the UAE's economy progressed, its territory became the world's experimental zone for pioneering construction technologies. The continuous rise of the construction industry has introduced a large number of labourers to stations on construction sites. How to systematically manage workers under regulations, while ensuring the rights and interests of both workers and enterprises is the main problem currently faced by NGC on its way forward. The customer Nael General Contracting (NGC), founded in 1998, is one of the UAE's premier construction companies. Its core areas of expertise include the Design and Execution of Turnkey Construction Projects, Steel Structures, Aluminum & Glassworks, Interior Fit-out, Hard & Soft landscapes, MEP infrastructure, and Facilities Management. Based on 25 years of safe working life, NGC currently has more than 9,000 employees and has successfully contracted not limited to 250 projects. “NGC is seeking the best intelligent attendance solution for one of its construction sites with nearly a thousand workers.” To this end, NGC consulted Anviz's long-term partner Xedos. The challenge Workers' attendance management on and off work is bitterly chaotic without intelligent attendance Workers' attendance management on and off work is bitterly chaotic without intelligent attendance equipment. Workers' shifts are unreasonable and shift coordination is formidable. There are even abundant irregularities such as punching in on behalf of others and tampering with attendance data without permission. So labourers take the fairness of wage calculations with a grain of salt. Need for an intelligent and complete attendance solution “At the same time, the human resources department spends at least 10 hours per month sorting out the clock data of nearly a thousand employees to output monthly results reports." "The financial department also demands to settle workers' compensation based on attendance reports. It leads to continuous delays in salary payments. It is urgent to seek an intelligent and complete attendance solution." The solution Simplify attendance while outputting cloud reports FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC Based on ensuring the attendance management of nearly a thousand labourers, while also meeting the output of centralised visual reports and reducing labour costs, FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC. NGC's site manager said, "Attendance at the construction site is not transparent, and most workers are often worried about whether their salary for the next month will be recorded in their accounts. There has even been chaos in paid attendance, which has brought a lot of trouble to the normal operation of construction." FaceDeep 3, CrossChex Cloud Based on high-precision liveness face detection and dual-camera lenses, FaceDeep 3 can accurately identify workers and complete personal attendance verification under any environmental conditions, preventing the use of fake faces such as videos and pictures to check in. The CrossChex Cloud implements hierarchical management and designs administrator operation logs to record their action lines, effectively eliminating the unhealthy trend of tampering with records for personal gain. Attendance visualisation reports Integrate through CrosssChex Cloud and SQL DATABASE to synchronise each employee's attendance records NGC's Finance Minister said, "Every month some workers appeal against errors in attendance records, but there is nothing we can do about the large amount of confusing data records." Integrate through CrosssChex Cloud and SQL DATABASE to synchronise each employee's attendance records, and automatically generate attendance visualisation reports. Real-time updates Administrators and employees can make attendance management transparent by viewing reports at any time. The cloud system is equipped with shift and schedule management functions that administrators can adjust in real time according to the construction progress. Workers can apply for make-up attendance to achieve flexible management. Key benefits Convenient and worry-free attendance experience The efficient attendance system ensures a quick clock-in experience and simplifies the attendance process. Cloud visual reports make it easy to calculate workers' salaries. Reduced human resource costs Cloud visual reports make it easy to calculate workers' salaries. For the HR department, there's no longer a need to manually sort out large amounts of attendance data. Client's quote “The person in charge of NGC said, "The attendance plan tailored by Anviz for us has received unanimous praise from all employees." "It reduced more than 85% of the labour costs spent on worker attendance management and saved the company nearly 60,000 dirhams per month."
Honeywell announced that Petróleos del Perú S.A. (Petroperú), one of the largest hydrocarbon producers, refiners, and distributors in Peru, will implement Honeywell cybersecurity solutions to help Petroperú strengthen the cyber resiliency of its refinery operations and accelerate its broader digital transformation. Cybersecurity consulting support Petroperú’s multi-year investment with Honeywell includes access to Honeywell’s cybersecurity consulting support, managed security services, and world-class threat detection capabilities. Honeywell will help Petroperú further scale its operational technology (OT) cybersecurity efforts to improve visibility into potential cybersecurity vulnerabilities and threats across its systems. Cybersecurity resiliency “Cybersecurity resiliency is a crucial capability that underpins our sustainable operations as we work toward the future in the energy transition,” said Fernando Villacorta Padilla, Chief Controls and Advanced Applications Engineer at Petroperú. He adds, “Honeywell’s cybersecurity services complement the innovative software solutions that it previously developed to support our digitalisation initiatives and our refinery modernisation project.” Honeywell Forge Workforce Competency solutions Integration of Honeywell cybersecurity solutions will help Petroperú to further improve its operational efficiency Petroperú’s implementation of Honeywell’s cybersecurity solutions builds upon its prior integration of Honeywell Forge Workforce Competency solutions, which the company currently uses to train its industrial workforce regarding safer and more efficient operations. The added integration of Honeywell cybersecurity solutions will help Petroperú to further improve its operational efficiency, safety, and security programs across Petroperú’s plants and refineries. Safe, more efficient operations “Without strong cybersecurity capabilities, energy companies that heavily rely on technology and information systems to operate can face serious consequences, including financial losses, operational disruptions, reputational damage, and environmental risks,” said Sunil Pandita, Vice President and General Manager of Honeywell Cyber & Connected Industrials. He adds, “While Petroperú is already at the forefront of the digital transformation within the energy sector, Honeywell’s cybersecurity solutions will help Petroperú to identify and minimise potential cyber risks in near real-time to create safer, more efficient operations that benefit both customers and employees.” Improving OT cybersecurity defences Honeywell has been working with Petroperú for almost 50 years. Additionally, Honeywell provides engineering, licences, services, and technical support for three units currently in operation. Honeywell cybersecurity solutions can help organisations improve their OT cybersecurity defences with vendor-agnostic solutions designed to assist in identifying, prioritising, and reducing OT cyber risks and potential vulnerabilities through advanced monitoring and detection.
Round table discussion
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)